chromium-127.0.6533.72-1.fc39
FEDORA-2024-f2e57b108e Packages in this update: chromium-127.0.6533.72-1.fc39 Update description: update to 127.0.6533.72 * CVE-2024-6988: Use after free in Downloads * CVE-2024-6989: Use after free in Loader...
chromium-127.0.6533.72-1.el8
FEDORA-EPEL-2024-08de4453df Packages in this update: chromium-127.0.6533.72-1.el8 Update description: update to 127.0.6533.72 * CVE-2024-6988: Use after free in Downloads * CVE-2024-6989: Use after free in Loader...
chromium-127.0.6533.72-1.fc40
FEDORA-2024-1b52220975 Packages in this update: chromium-127.0.6533.72-1.fc40 Update description: update to 127.0.6533.72 * CVE-2024-6988: Use after free in Downloads * CVE-2024-6989: Use after free in Loader...
Providing Security Updates to Automobile Software
Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to...
ICO Slams Electoral Commission for Basic Security Failings
The ICO found that the Electoral Commission did not have appropriate security measures in place, allowing hackers to access the personal details of 40 million...
USN-6923-2: Linux kernel vulnerabilities
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of...
USN-6921-2: Linux kernel vulnerabilities
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, and Shweta Shinde discovered that an untrusted hypervisor could inject malicious #VC interrupts and compromise the security guarantees of...
Just One in 10 Attacks Flagged By Security Tools
Picus Security claims just 12% of simulated attacks trigger an alert Read More
How to setup PGP Keys for Encrypted Email
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information...
Millions of Spoofed Emails Bypass Proofpoint Security in Phishing Campaign
Guardio Labs found that attackers exploited a configuration setting in Proofpoint’s email protection service, allowing outbound messages to bypass email protections Read More